Some basic concepts such as community and people in a community need to be reinforced. They need to understand the difference between a stranger and a trusted adult. At this point, the relationship between a real community and a virtual community should be connected. It should be emphasized that students should always use an adult while going online and differentiate what it means to feel safe versus unsafe.
Key Terms
Review Terms Community: the area where we live, with places where we know real people. Cyber Community: a website where we visit, learn, play games, create virtual characters/pets/friends Cyber Citizen: People who actively participate in a cyber community Cyber Smart: Making good choices when in a cyber community Responsible Citizen: A person who uses their cyber smarts Trusted Adult: A parent, teacher, or guardian Email: A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address. Virus-A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. Anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer. File - Anything that can be saved on your computer Attachment- This is a file that has been added to an e-mail. It could be something like a photograph or a clip of your favorite song. It could be something harmful to your computer, like a virus. Remind children to never open an attachment or e-mail from someone they don't know.
New Terms Intellectual Property- refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Pirates- People who take things that belong to others from the Internet without asking permission. Spam- Unwanted e-mail from someone you don't know. It is usually trying to sell you something. Plagiarism- The act of copying someone's work and claiming it as their own
Activities & Lessons
(You might need to scroll down the page to locate the activities and videos)
1. Cyber Community
Concepts
Place in communities are identified by addresses.
An Internet address is called a URL.
Terminology introduction and discussion: appropriate and inappropriate
Inappropriate places in the community, and on the Internet, are described as places that are not suitable for kids.
Age-appropriate descriptions of inappropriate websites
Concept introduction: inappropriate website can be accessed through e-mail.
E-mail is a way people communicate online by sending written letters.
Appropriate e-mail is a fun way to communicate with people you know.
Even if e-mail is not used very much yet at this age, the important thing to remember is that students should follow the rules for Internet and e-mail use that parents have established.
Age-appropriate strategy to get out of inappropriate websites is described as:
Click the ‘X’ (close box) in the corner of the web page.
Discussion
What are some of the dangers in a cyber community?
How can one protect themselves from online dangers?
What are some things we can do to promote good cyber citizenship?
How can email impact us in a positive way? Negative way?
Not mentioned above: "The Bully Who Looks The Other Way" and does nothing...
Discussion:
What are some signs that someone might be bullying online?
What are some steps you can take if you notice someone bullying?
Activities: Review the 4 types of online bullies. Assign students into small groups and have them role play a scene where they can identify one of the 4 types of bullies mentioned above. Have the other students guess which bully scenario they are trying to role play. It might be helpful to print out the activity and cut them up into activity cards to handout. Discuss steps they can take to avoid cyberbullying. This is a great activity to repeat and discuss more than once.
Grade 3
Table of Contents
The Big Idea
Some basic concepts such as community and people in a community need to be reinforced. They need to understand the difference between a stranger and a trusted adult. At this point, the relationship between a real community and a virtual community should be connected. It should be emphasized that students should always use an adult while going online and differentiate what it means to feel safe versus unsafe.Key Terms
Review Terms
Community: the area where we live, with places where we know real people.
Cyber Community: a website where we visit, learn, play games, create virtual characters/pets/friends
Cyber Citizen: People who actively participate in a cyber community
Cyber Smart: Making good choices when in a cyber community
Responsible Citizen: A person who uses their cyber smarts
Trusted Adult: A parent, teacher, or guardian
Email: A service that allows people to send messages with pictures and sounds from their computer to any other computer in the world. To send someone an e-mail message you need an e-mail account and to know the other person's e-mail address.
Virus-A computer program that can destroy files or make your computer "crash." Viruses can be sent via e-mail or through other file-sharing programs. Anti-virus software and not downloading information from people you don't know can help keep viruses from damaging your computer.
File - Anything that can be saved on your computer
Attachment- This is a file that has been added to an e-mail. It could be something like a photograph or a clip of your favorite song. It could be something harmful to your computer, like a virus. Remind children to never open an attachment or e-mail from someone they don't know.
New Terms
Intellectual Property- refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce.
Pirates- People who take things that belong to others from the Internet without asking permission.
Spam- Unwanted e-mail from someone you don't know. It is usually trying to sell you something.
Plagiarism- The act of copying someone's work and claiming it as their own
Activities & Lessons
(You might need to scroll down the page to locate the activities and videos)1. Cyber Community
Concepts
Discussion
Activity:Know The Rules- Check First(Scroll down and download the lesson plan)
Video: Know the Rules Rap Video
2. Cyber Security
Concepts
Discussion
Activity: Don't Open That File!(Scroll down and download the lesson plan)
Video: Don't Open that File!
3. Personal Safety
Concepts
Discussion
Video: Meet The Wizzy Wigs
Video:Which Wizzy Wig is Which?
Video: Rapmania (What to do if you run into a Wizzy Wig)
4. Intellectual Property
(See copyright page for rules & fair use guidelines)Discussion
Video: **Clicky's Stolen Song: A Lesson in Digital Ethics** (scroll down to find it)
5. Cyberbullying
ConceptsThere are 4 types of online bullies:
Not mentioned above: "The Bully Who Looks The Other Way" and does nothing...
Discussion:
Activities: Review the 4 types of online bullies. Assign students into small groups and have them role play a scene where they can identify one of the 4 types of bullies mentioned above. Have the other students guess which bully scenario they are trying to role play. It might be helpful to print out the activity and cut them up into activity cards to handout. Discuss steps they can take to avoid cyberbullying. This is a great activity to repeat and discuss more than once.